The IT world is waiting on pins and needles today for a high-profile Microsoft Windows 10 security patch, and now we know why. The US National Security Agency (NSA) reportedly discovered a serious flaw in Windows 10 that could expose users to surveillance or serious data breaches, according to the
Washington Post. That was backed by
Krebs on Security, which reported that the NSA confirmed that it did find a major vulnerability that it passed on to Microsoft.
In the past, the NSA might have kept the security hole to itself, using it to spy on adversaries. The best examples of that are
WannaCry and
EternalBlue, Windows 10 vulnerabilities discovered and exploited by the NSA for years. The agency developed hacking tools to exploit those holes, but unfortunately some of them were uncovered and released by a suspected Russian hacking group called
Shadow Brokers. EternalBlue is
still used to this day on unpatched systems for ransomware, theft and other types of attacks.
The NSA confirmed that the vulnerability affects Windows 10 and Windows Server 2016. It said that it flagged the dangerous bug because it "makes trust vulnerable." However, it wouldn't say when it found the flaw and declined to discuss it further until Microsoft released a patch.
According to Krebs, the vulnerability was found in a Windows component called crypt32.dll, which handles "certificate and cryptographic messaging functions," according to Microsoft. An exploit in that area could affect authentication on Windows desktops and servers, sensitive data on Microsoft's Internet Explorer and Edge browsers and many third-party applications. Hackers could supposedly also use it to spoof digital signatures, making malware look like a legitimate app.
A software patch has already been released to critical Windows 10 clients including the US military and managers of key internet infrastructure. Microsoft will reportedly release a patch to everyone else later today, and Krebs said it will be "a doozy of an update that will need to be addressed immediately by all organizations running Windows." This article will be updated once we hear more from Microsoft.